Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:48
Static task
static1
Behavioral task
behavioral1
Sample
a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe
Resource
win10v2004-20230220-en
General
-
Target
a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe
-
Size
696KB
-
MD5
363d3d19fb05eea509e8509a8b3a67cd
-
SHA1
1584877063d139b2bd3b37ce7193b7e0b3106bbe
-
SHA256
a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06
-
SHA512
9379633f07bcd1b2804db1ea267f96e7d06b22f6def3a631c75bf8b741842c9aea12cdddad8d254ad01aeb8d42593cb85b5d9da7454ee22c063b36f40ba93df1
-
SSDEEP
12288:uMrZy90QQQhRVTlVbGgmFp4z0KbuS/1akbLaXnhgoTwqhv33iAlk:fy02jVSvv4AK7ckbLwhgoUqN3m
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1783.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1852-192-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-191-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-194-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-196-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-198-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-200-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-202-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-204-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-206-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-208-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-211-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-216-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-218-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-220-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-222-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-224-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-226-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1852-228-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1364 un913015.exe 880 pro1783.exe 1852 qu6152.exe 2324 si346661.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1783.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1783.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un913015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un913015.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3536 880 WerFault.exe 84 840 1852 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 880 pro1783.exe 880 pro1783.exe 1852 qu6152.exe 1852 qu6152.exe 2324 si346661.exe 2324 si346661.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 880 pro1783.exe Token: SeDebugPrivilege 1852 qu6152.exe Token: SeDebugPrivilege 2324 si346661.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1364 1824 a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe 83 PID 1824 wrote to memory of 1364 1824 a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe 83 PID 1824 wrote to memory of 1364 1824 a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe 83 PID 1364 wrote to memory of 880 1364 un913015.exe 84 PID 1364 wrote to memory of 880 1364 un913015.exe 84 PID 1364 wrote to memory of 880 1364 un913015.exe 84 PID 1364 wrote to memory of 1852 1364 un913015.exe 90 PID 1364 wrote to memory of 1852 1364 un913015.exe 90 PID 1364 wrote to memory of 1852 1364 un913015.exe 90 PID 1824 wrote to memory of 2324 1824 a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe 94 PID 1824 wrote to memory of 2324 1824 a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe 94 PID 1824 wrote to memory of 2324 1824 a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe"C:\Users\Admin\AppData\Local\Temp\a3936ce16d3058148aa89df5bdfbee2db9eb6936f22a699b0b63a8fcfab6ef06.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un913015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un913015.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1783.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1783.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 10844⤵
- Program crash
PID:3536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6152.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6152.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 18284⤵
- Program crash
PID:840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si346661.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si346661.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 880 -ip 8801⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1852 -ip 18521⤵PID:3760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52404576176331a97acacbb087157b817
SHA1d785a07921c1948765630bea08c1b50a4ab4d71e
SHA256d52d74efe89159937da351d54a454e5f80033201b372c5f1912ef9358e19f618
SHA5123c2fbe723f1a9b8c0b8ff5d3600a24104e5400be3d1285c7ecc6d10091894f1dfdbfba8a858075bc332fe6d97da0a60a9e4ffe3ab23a4d61467d11f2973b2fe6
-
Filesize
175KB
MD52404576176331a97acacbb087157b817
SHA1d785a07921c1948765630bea08c1b50a4ab4d71e
SHA256d52d74efe89159937da351d54a454e5f80033201b372c5f1912ef9358e19f618
SHA5123c2fbe723f1a9b8c0b8ff5d3600a24104e5400be3d1285c7ecc6d10091894f1dfdbfba8a858075bc332fe6d97da0a60a9e4ffe3ab23a4d61467d11f2973b2fe6
-
Filesize
554KB
MD5f86b866a434b39e1e2f26165f2661ac4
SHA1c3638516b172c1375afe756b3d5cf6b75d25d53c
SHA256a8c71d13d970cc3030623ebb748c1b22108c9e9405f470c2ec844e183048b075
SHA512bd64171c05213a689bfc7b43b936f920d3ac75136bc3f95619949f18eddf8e7de485e0dce2cd81afe30ebe3c8fb8db10f884472ecdd3c3293c903ce7ee5d611a
-
Filesize
554KB
MD5f86b866a434b39e1e2f26165f2661ac4
SHA1c3638516b172c1375afe756b3d5cf6b75d25d53c
SHA256a8c71d13d970cc3030623ebb748c1b22108c9e9405f470c2ec844e183048b075
SHA512bd64171c05213a689bfc7b43b936f920d3ac75136bc3f95619949f18eddf8e7de485e0dce2cd81afe30ebe3c8fb8db10f884472ecdd3c3293c903ce7ee5d611a
-
Filesize
308KB
MD52c267b261ebcbc2f9ddd0e4970951f2c
SHA115b1ae7e089c5653ef4a2f51146a3c4e2e68ae35
SHA2566134066b967d45a0649bf324d459a7bd93cf1764b44d0851a9742e8c48aa8021
SHA512eb2a3528049346393827732564dd1ee3610f9cdb8ef493e5b8c02a2c88084767a122bfdd40961e0657eb71e5c9e1e00581d7606bb2e840d24837367fc3ee89d4
-
Filesize
308KB
MD52c267b261ebcbc2f9ddd0e4970951f2c
SHA115b1ae7e089c5653ef4a2f51146a3c4e2e68ae35
SHA2566134066b967d45a0649bf324d459a7bd93cf1764b44d0851a9742e8c48aa8021
SHA512eb2a3528049346393827732564dd1ee3610f9cdb8ef493e5b8c02a2c88084767a122bfdd40961e0657eb71e5c9e1e00581d7606bb2e840d24837367fc3ee89d4
-
Filesize
366KB
MD5032e323f84ed396f3d514b96ea96458b
SHA11f4db74cf0dd5798e4aab59daf99e2d7153aa6aa
SHA2561e91284a3f973105f7a7cab9e12c0ac051cd3504860bb9c4bcbf167d98acc77d
SHA512a5426cafc64c31aa09cbf3ccb24a623ec9f277334d027fbbf7a8cdc697127432d6b438bda1099640b0fccf040ddd0311740d4848d8a33925377b7ae3ce3e2a1b
-
Filesize
366KB
MD5032e323f84ed396f3d514b96ea96458b
SHA11f4db74cf0dd5798e4aab59daf99e2d7153aa6aa
SHA2561e91284a3f973105f7a7cab9e12c0ac051cd3504860bb9c4bcbf167d98acc77d
SHA512a5426cafc64c31aa09cbf3ccb24a623ec9f277334d027fbbf7a8cdc697127432d6b438bda1099640b0fccf040ddd0311740d4848d8a33925377b7ae3ce3e2a1b